Feeds

Wearable Java computer open doors

Seen in Turkey

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

A US firm is flogging a wearable Java computer which can be used as a key in the real and virtual worlds.

The iButton from Dallas Semiconductor is touted as a two-in-one fob, and can be used either as a physical key to open doors or a computer key for secure network log-in, or for electronic signatures.

The gadget is a 16mm Java-based chip in a key-sized metal cover, according to the company's Website. It has 64Kb Rom, 134Kb Ram, and can store more than 30 digital certificates.

The iButton can also be embedded in everyday items such as rings, watches or wallets. To be made into a doorkey, the user presses it onto a Blue Dot, a device which transfers information to and fro the gadget.

The device is already used in Istanbul, apparently. ®

Related Stories

Freeserve's mouse mat gets wired
Porn site confusion forces gadget site relaunch

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.